Security programs are much more effective when they are perceived as being effective and comprehensive. Conversely, when otherwise well designed security programs are perceived as being weak, weakness is the likely result. Most security programs are only as good as their weakest link. Consider two shopping malls. Mall number one has trash blowing about the […]
Most security driven litigation results from claims of inadequate security. This occurs most frequently when a guest or invitee allegedly becomes victimized by the criminal acts of a third party while on the property of the enterprise being sued. There are occasions that an invitee alleges victimization by an employee or contractor of the property […]
In many cases Supply Chain theft offers perpetrators high rewards with relatively low risk. When perpetrators can walk into distribution centers and/or trucking terminals, hook up tractors onsite merchandise-full containers, which may be loaded with over a million dollars of product, and not get caught, something is wrong. Try taking the above scenario and multiply […]
Here is the link for this paper: https://ncjrs.gov/pdffiles1/nij/247182.pdf As this article alludes to it has taken some time for Police Department around the world to accept the legitimacy of private security operations. This acceptance is in part, due to the significant influx of former law enforcement professionals into the ranks of private security and from […]